When you add an interface to a hotspot, the associated access points act as hotspots. Hotspots support a full suite of protection features and authentication methods. You can mitigate these threats by scanning the access points on your network and marking unauthorized access points as rogue access points. It looks like someone on your network